CVE-2024-50258

Source
https://cve.org/CVERecord?id=CVE-2024-50258
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50258.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50258
Downstream
Related
Published
2024-11-09T10:15:11.311Z
Modified
2026-03-20T12:39:39.502691Z
Summary
net: fix crash when config small gso_max_size/gso_ipv4_max_size
Details

In the Linux kernel, the following vulnerability has been resolved:

net: fix crash when config small gsomaxsize/gsoipv4max_size

Config a small gsomaxsize/gsoipv4maxsize will lead to an underflow in skdstgsomaxsize(), which may trigger a BUGON crash, because sk->skgsomaxsize would be much bigger than device limits. Call Trace: tcpwritexmit tsosegs = tcpinittsosegs(skb, mssnow); tcpsetskbtsosegs tcpskbpcountset // skb->len = 524288, mssnow = 8 // u16 tsosegs = 524288/8 = 65535 -> 0 tsosegs = DIVROUNDUP(skb->len, mssnow) BUGON(!tsosegs) Add check for the minimum value of gsomaxsize and gsoipv4maxsize.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50258.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
46e6b992c2502b094e61da6994f1363f3b7c1413
Fixed
90c8482a5d9791259ba77bfdc1849fc5128b4be7
Fixed
e9365368b483328639c03fc730448dccd5a25b6b
Fixed
ac5977001eee7660c643f8e07a2de9001990b7b8
Fixed
e72fd1389a5364bc6aa6312ecf30bdb5891b9486
Fixed
9ab5cf19fb0e4680f95e506d6c544259bf1111c4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50258.json"